{"id":265,"date":"2025-12-04T19:41:20","date_gmt":"2025-12-04T19:41:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/?page_id=265"},"modified":"2025-12-04T20:03:38","modified_gmt":"2025-12-04T20:03:38","slug":"cybersecurity-professional-career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/cybersecurity-professional-career-paper\/","title":{"rendered":"Cybersecurity Professional Career Paper"},"content":{"rendered":"\n<p><strong>Cybersecurity Professional Career Paper: Cyber Security Analyst<\/strong><br>Student Name: Aiden Johnson<br>School of Cybersecurity<br>CYSE 201S: Cybersecurity and the Social Sciences<br>Instructor Name: Diwakar Yalpi<br>Date: 11\/16\/25<\/p>\n\n\n\n<p><strong>Cyber Security Analyst<br><\/strong>A Cyber Security Analyst performs many tasks in their job, including planning,<br>implementing, and upgrading their controls and measures (Surya et al., 2023). Their role is to<br>monitor the network and ensure there are no security issues. The reason cybersecurity is so vital<br>in the modern world is that everything is online, including your personal and financial data. You<br>do not want to share your Social Security number or where you live with anyone. Without<br>cybersecurity, this data would be vulnerable, and someone could just access a company&#8217;s<br>database and steal your information. This situation can become a serious problem for the<br>company and the privacy of the people who trust the company. This paper will discuss the<br>cybersecurity analyst&#8217;s role, challenges women face in entering the cybersecurity field, and why<br>cybersecurity plays a significant role in Society.<\/p>\n\n\n\n<p><br><strong>Social Science Principles<\/strong><br>A cybersecurity analyst has a rewarding and fun career. Their success depends not only<br>on their skills but also on understanding human behavior. Their job is to detect cyber-attacks<br>and determine why people fall for them. They do this by thinking like the person who falls for<br>the attacks (Dawson &amp; Thomson, 2018). Principles such as the Big Five personality traits are<br>also incorporated into cybersecurity. The article discusses how this point is used to determine<br>where a person should work and whether they should work at a place they hate or agree with the<br>company&#8217;s points. For example, if someone doesn\u2019t agree with a company&#8217;s points or hates the<br>company, it risks an insider attack (Dawson &amp; Thomson, 2018). This can be worse than an<br>outsider attack, as all an insider has to do to steal the company&#8217;s data is to insert a flash drive into<br>the computer and copy the data onto it. A cybersecurity analyst has a combination of technical skills and social intelligence to understand the computer network and the people with access, to<br>keep it safe.<br>Dawson &amp; Thomson (2018) found that situations influence how individuals act. For<br>example, changes in a person&#8217;s life, such as religious events or bureaucratic rules, can have a<br>significant effect on their freedom (Dawson &amp; Thomson, 2018). In contrast, a military officer<br>will behave in the same way regardless of their role in the military. Someone without limits can<br>think or act differently, raising more points and questions. (Dawson &amp; Thomson, 2018).<\/p>\n\n\n\n<p><strong>Application of Key Concepts<\/strong><br>A key concept discussed was the Big Five personality traits. But it is an excellent point in<br>understanding why people think and do on the internet. The reason why these Big Five<br>personality trait concepts are talked about is that, for a cybersecurity analyst, you have to<br>understand these five traits as they provide a reasonable basis to start thinking about why some<br>fall for an attacker, which is a good point to begin thinking neutrally. As a cybersecurity analyst,<br>you have to think about a situation neutrally, don\u2019t use options or what you may know, just stick<br>to the facts of the attack. When you start thinking neutrally, you understand what is wrong and<br>what needs to be fixed. Thinking neutrally means focusing on the facts rather than just guessing.<br>It is also argued that companies should hire people based on their values rather than their skills<br>(Dawson &amp; Thomson, 2018). In other words, if you hire someone whose values match the A <br>company&#8217;s, it can allow people to think more neutrally, rather than someone whose values<br>disagree with the company&#8217;s and can\u2019t consider both sides of the situation.<\/p>\n\n\n\n<p><strong>Marginalization<br><\/strong>In relation to cybersecurity careers and marginalized groups. Women face significant<br>barriers when seeking jobs in STEM fields, including cybersecurity. There are a few reasons they<br>struggle to get jobs in cybersecurity, including social expectations, family conflicts, a lack of role<br>models in the field, and a lack of mentors (Giboney et al., 2023). Social stereotyping is a<br>problem with people thinking they can\u2019t do the job or just not getting sponsorship. There are<br>many more sponsorship opportunities for women to get jobs in cybersecurity. And a more social<br>system for women in the field, too (Giboney et al., 2023). In addition, more companies are<br>working to eliminate toxic work environments for women, removing stereotypes and providing<br>training and skills to help them gain experience (Giboney et al., 2023).<\/p>\n\n\n\n<p><strong>Career Connection to Society<br><\/strong>The ways that cybersecurity professionals contribute to the safety and stability of societal<br>infrastructure are that they understand how to take care of vulnerabilities. Which<br>vulnerabilities will always be a problem in any digital system. So, they use their skills and<br>knowledge of digital security to keep the risk as low as possible. Cybersecurity professionals do<br>not think about it in a company or society until a problem comes up. Cybersecurity professionals<br>have to keep the CIA-Triad in place so that, if societal infrastructures like healthcare or financial<br>systems get hacked, people&#8217;s data doesn\u2019t breach confidentiality (Cavelty et al., 2023).<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><br>A Cyber Security Analyst plays a key role in the Cybersecurity field. They have a<br>combination of technical skills, domain specific knowledge, and social intelligence (Dawson,<br>2018). They understand how attacks occur and how people fall for them. An analyst&#8217;s goal is to<br>monitor the online environment and identify situations and people that make it easy to fall for<br>these attacks. A cybersecurity analyst has to consider both sides of an attack to understand what<br>is going on and to identify the facts. We also need to consider the broader side of the<br>cybersecurity field. Women entering the career still face challenges in the field. Women can<br>offer different perspectives about cybersecurity and offer different ways to approach situations.<br>In that case, because women think differently, it may lead to finding a better solution to the<br>problem. And with the digital age we live in, we have to think about cybersecurity&#8217;s overall<br>impact on society, as it is no longer just a company problem. Now, if an attack happens to an<br>organization, we can not have access to fuel, cars, houses, or food. If this happens to our banking<br>system, it can be devastating. Bank systems could be shut down because of an attack. Using your<br>bank system would not work, so the only way you would be able to buy anything would be with<br>cash.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Giboney, J.S., Anderson, B. B., Wright, G. A., Oh, S., Taylor, Q., Warren, M., &amp;<br>Johnson, K. (2023). Barriers to a cybersecurity career: Analysis across career stage and<br>gender. Computers &amp; Security, 132, 103316\u2013103316.<br>https:\/\/doi.org\/10.1016\/j.cose.2023.103316<br>Dawson, J., &amp; Thomson, R. (2018). The Future Cybersecurity Workforce: Going Beyond<br>Technical Skills for Successful Cyber Performance. Frontiers in Psychology, 9(9).<br>https:\/\/doi.org\/10.3389\/fpsyg.2018.00744<br>Cavelty, M. D., Eriksen, C., &amp; Scharte, B. (2023). Making cyber security more resilient:<br>adding social considerations to technological fixes. Journal of Risk Research, 26(7), 801\u2013814 https:\/\/doi.org\/10.1080\/13669877.2023.2208146<br>Surya, L., Patel, M., &amp; Ravi Teja Yarlagadda. (2023). Current Trends in Information<br>Technology. Current Trends in Information Technology, 11(1).<br>https:\/\/doi.org\/10.37591\/ctit<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Cybersecurity20Professional20Career20Paper20Aiden20Johnson.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Cybersecurity20Professional20Career20Paper20Aiden20Johnson.docx-1.\"><\/object><a id=\"wp-block-file--media-d64d7ed8-712a-448a-b4b5-6473caa39e8f\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Cybersecurity20Professional20Career20Paper20Aiden20Johnson.docx-1.pdf\">annotated-Cybersecurity20Professional20Career20Paper20Aiden20Johnson.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-content\/uploads\/sites\/39390\/2025\/12\/annotated-Cybersecurity20Professional20Career20Paper20Aiden20Johnson.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d64d7ed8-712a-448a-b4b5-6473caa39e8f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Professional Career Paper: Cyber Security AnalystStudent Name: Aiden JohnsonSchool of CybersecurityCYSE 201S: Cybersecurity and the Social SciencesInstructor Name: Diwakar YalpiDate: 11\/16\/25 Cyber Security AnalystA Cyber Security Analyst performs many tasks in their job, including planning,implementing, and upgrading their controls&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/cybersecurity-professional-career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24877,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/265"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/users\/24877"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/comments?post=265"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/265\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/pages\/265\/revisions\/280"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-eporfolio\/wp-json\/wp\/v2\/media?parent=265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}